Internal Communication
The internal communication requirement means you must consistently communicate internal-control objectives, control responsibilities, and control-related information to the right people, through defined channels, in time for them to do their jobs. Your job is to make those communications intentional, documented, role-based, and provably effective across all levels of the organization.
Key takeaways:
- Define what internal-control information must be communicated, to whom, how, and how quickly.
- Assign owners for each communication channel and for keeping messages current as controls and risks change.
- Keep evidence that communications happened and that staff understood and acted on them (not just that a policy exists).
“Internal communication” under COSO Principle 14 sits in the “Information and Communication” component of the Internal Control–Integrated Framework. The requirement is simple to say and easy to under-build: you need internal information to move through the organization so controls actually operate as designed. That includes clear objectives for internal control, role-specific responsibilities, and practical guidance people can follow during normal operations and during exceptions.
For a CCO, GRC lead, or compliance owner, the fastest path to operationalizing this requirement is to treat it like a control system of its own: define messages, define audiences, define channels, define cadence and triggers, and define proof. The typical failure mode is relying on static artifacts (a Code of Conduct, a controls narrative, a yearly training) while operational teams still make day-to-day decisions without timely, usable control guidance.
This page translates COSO’s requirement into an implementation checklist you can put into motion immediately: governance, channel design, message standards, evidence capture, and audit-ready artifacts. It also flags where internal communication commonly breaks in third-party workflows, incident response, financial close, and change management.
Regulatory text
Excerpt (COSO): “The organization internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.” (COSO IC-IF (2013))
Operator interpretation:
You must (1) identify the internal-control information that people need to do their jobs, (2) deliver it through reliable internal channels, and (3) make it understandable and actionable for the roles that execute and oversee controls. A written policy alone is not enough; the communication must be embedded into operational workflows and updated as risks, processes, and controls change. (COSO IC-IF (2013))
Plain-English requirement interpretation (what this really means)
Internal communication is the “control plane” for your internal control system. If people do not receive clear, timely direction on control objectives and who is responsible for what, controls drift. Common examples:
- The business thinks Security owns a control, Security thinks IT owns it, and nobody runs it.
- A process changes (new system, new approval step) but the control description and training do not change, so performance evidence becomes inconsistent.
- A new third party is onboarded, but Procurement never receives updated due diligence requirements, so onboarding bypasses required checks.
COSO’s bar is practical: internal communication must support the functioning of internal control. If a communication approach does not change behavior, clarify ownership, or drive execution, treat it as insufficient. (COSO IC-IF (2013))
Who it applies to (entity and operational context)
Entities: Organizations implementing COSO-aligned internal control programs, including teams supporting internal audit and management’s control environment. (COSO IC-IF (2013))
Operational scope (where this shows up in real life):
- Control owners and operators: Finance close, IT operations, Security operations, HR, Procurement, Revenue operations.
- Second line (Compliance/GRC/Risk): sets requirements, monitors, advises, escalates.
- Third line (Internal Audit): tests that communications are adequate and drive consistent control execution.
- High-change areas: system implementations, reorganizations, mergers, policy refresh cycles, and new third-party onboarding.
What you actually need to do (step-by-step)
1) Define the “internal control communication inventory”
Create a simple inventory of what must be communicated. Minimum categories:
- Control objectives (what the control system is trying to achieve, by domain)
- Control responsibilities (RACI by role, not by person)
- Operating procedures (how to perform the control, including exceptions)
- Escalation paths (what to do when the control cannot be performed)
- Change triggers (events that require new communications)
Deliverable: a one-page matrix that links message types to audiences and channels.
2) Map audiences to roles and decision points
Build role-based audience groups tied to the moments they need information:
- Approvers (who signs off)
- Operators (who executes)
- Reviewers (who checks)
- Oversight (who monitors)
- Executives/Board reporting recipients (who must be informed)
Keep it role-based so reorganizations do not break your communication model.
3) Standardize channels and assign owners
Pick a small set of official channels and assign owners responsible for accuracy and timeliness:
- Policy repository (source of truth)
- Control procedure library / runbooks
- Training and attestations
- Ticketing/workflow prompts (embedded requirements)
- Operational communications (email templates, chat announcements, intranet posts)
- Management reporting (dashboards, metrics packs)
For each channel, document:
- What information belongs there
- Who approves updates
- How updates are published
- How you prove distribution and receipt
4) Write communication “minimum content standards”
To make communications usable, define a template for control-impacting messages:
- What changed and why (risk/control driver)
- Who is impacted (roles, teams)
- Effective date and transition rules
- Required actions (step-by-step)
- Evidence expectations (what to retain, where)
- Escalation contact
This removes ambiguity and improves audit outcomes because your messages become consistent artifacts.
5) Embed communications into workflows (where controls actually run)
Treat workflow integration as a control, not a convenience. Examples:
- Third-party onboarding workflow includes required due diligence steps and auto-notifies requestors of missing items.
- Access request workflow shows the role owner their approval responsibility and logs the decision.
- Financial close checklist includes prompts for reconciliations, reviews, and exception escalation.
If you run Daydream or another GRC system, configure it so control owners receive tasks, due dates, and evidence requests in the same place they execute work. The point is fewer “FYI” messages and more action-driven communications with retained audit trails.
6) Build feedback loops and escalation rules
COSO expects communication to support functioning. That requires feedback:
- Add a mechanism for questions (central mailbox, ticket queue, office hours).
- Track recurring confusion points and update procedures.
- Define escalation SLAs for control blockers (who decides on compensating controls).
7) Test effectiveness like a control
Do not stop at “sent.” Test whether communication worked:
- Spot-check control owners: can they describe their responsibilities and evidence requirements?
- During control testing, log “communication failure” as a root cause category when evidence is missing or inconsistent.
- Use post-incident and post-audit retrospectives to identify communication gaps.
Required evidence and artifacts to retain
Auditors look for proof of design and operating effectiveness of your communication approach. Keep:
- Internal communication policy/standard for internal control information (scope, channels, governance)
- Communication inventory matrix (message type → audience → channel → owner → trigger)
- Role-based responsibility maps (RACI for key controls)
- Training materials and completion/attestation records for control owners and operators
- Change communications (templates + copies of actual announcements)
- Workflow configuration evidence (screenshots, system logs, approval routing)
- Meeting minutes and decision logs where control responsibilities, exceptions, or process changes were discussed
- Knowledge base/runbooks with version history
- Issue logs showing escalations and how communication was corrected
Practical tip: version control matters. Keep prior versions and dates so you can show what people were told at the time a control was performed.
Common exam/audit questions and hangups
Expect these lines of questioning:
- “Show me how a control owner learns their responsibilities.”
- “How do you communicate changes to controls or procedures, and how do you ensure the message reaches impacted roles?”
- “Where is your source of truth for control procedures?”
- “How do you know people understood the communication?”
- “What happens when a control cannot be performed due to a system outage or missing input?”
- “How do third-party related requirements get communicated to Procurement and business requestors?”
Hangup: teams often present a policy library and annual training, but cannot show targeted communications tied to actual control changes or exceptions.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: one-channel reliance (policy repository only).
Fix: maintain a source of truth, but push key requirements into workflows and role-specific runbooks. -
Mistake: communications are generic (“all employees”).
Fix: communicate by role and process step. Operators need procedures; executives need risk and status. -
Mistake: no trigger-based updates.
Fix: define triggers such as system changes, new third-party types, audit findings, or incident learnings that require refreshed communications. -
Mistake: no evidence of receipt or comprehension.
Fix: use attestations for key roles, track completion, and do periodic spot-check interviews during control testing. -
Mistake: ownership ambiguity.
Fix: assign owners for every channel and every control family; document approvals and update workflows.
Enforcement context and risk implications
COSO is a framework, not an enforcement body. The risk is indirect but real: weak internal communication becomes a root cause for control failures, inconsistent evidence, missed escalations, and gaps in third-party oversight. Those failures can compound during audits, investigations, financial reporting assertions, and incident response because you cannot prove that responsibilities were known and executed. (COSO IC-IF (2013))
Practical 30/60/90-day execution plan
First 30 days (stabilize and baseline)
- Identify the top control areas where failures recur (close process, access, change management, third-party onboarding).
- Draft the internal control communication inventory matrix (message types, audiences, channels, triggers, owners).
- Standardize the “control change communication” template and require its use for any control-impacting change.
- Centralize the source of truth for control procedures and link it from existing tools (ticketing, intranet).
Days 31–60 (embed and evidence)
- Map RACI for priority controls and publish role-based responsibility pages.
- Add workflow prompts where feasible (checklists, required fields, approval routing).
- Implement attestations for control owners/operators on responsibilities and evidence expectations.
- Start capturing evidence systematically (distribution logs, version history, meeting minutes).
Days 61–90 (test and improve)
- Run a targeted effectiveness test: interview a sample of operators and reviewers, and validate that they can perform controls from documentation alone.
- Use internal audit-style walkthroughs to confirm communications align with actual process steps.
- Fix the top confusion points by updating procedures and re-issuing targeted comms.
- Formalize ongoing governance: quarterly review of the communication inventory, triggers, and channel owners.
Frequently Asked Questions
Do we need to communicate internal control responsibilities to every employee?
Communicate to all relevant personnel, but tailor the message to the role. Most employees need awareness-level expectations, while control owners and operators need specific procedures, evidence rules, and escalation steps. (COSO IC-IF (2013))
What’s the minimum evidence an auditor will accept for internal communication?
Keep the communication standard, role mappings (RACI), records of key messages (especially changes), and proof of completion for role-based training/attestations. Add workflow logs where responsibilities are executed, because they show real operating behavior.
How do we handle internal communication for third-party risk requirements?
Put requirements into the third-party intake workflow, not just a policy. Procurement and business requestors should see required due diligence steps, approval gates, and escalation paths at the moment they initiate or renew a third party relationship.
How do we prove people understood the communication?
Use short role-based attestations tied to responsibilities, plus periodic spot-check interviews during control testing. Track recurring questions and update the runbook; the change history becomes supporting evidence.
What triggers require a new internal communication under this requirement?
Treat any control-impacting change as a trigger: process redesign, system migration, re-org affecting ownership, new risk acceptance decisions, audit findings, and incident learnings that change procedures or escalation.
We have too many channels (email, intranet, Slack, tickets). Is that a problem?
Too many channels creates conflicts and stale guidance. Define a source of truth for procedures and a small set of “official” broadcast channels, then direct all messages back to the authoritative procedure with version control.
Frequently Asked Questions
Do we need to communicate internal control responsibilities to every employee?
Communicate to all relevant personnel, but tailor the message to the role. Most employees need awareness-level expectations, while control owners and operators need specific procedures, evidence rules, and escalation steps. (COSO IC-IF (2013))
What’s the minimum evidence an auditor will accept for internal communication?
Keep the communication standard, role mappings (RACI), records of key messages (especially changes), and proof of completion for role-based training/attestations. Add workflow logs where responsibilities are executed, because they show real operating behavior.
How do we handle internal communication for third-party risk requirements?
Put requirements into the third-party intake workflow, not just a policy. Procurement and business requestors should see required due diligence steps, approval gates, and escalation paths at the moment they initiate or renew a third party relationship.
How do we prove people understood the communication?
Use short role-based attestations tied to responsibilities, plus periodic spot-check interviews during control testing. Track recurring questions and update the runbook; the change history becomes supporting evidence.
What triggers require a new internal communication under this requirement?
Treat any control-impacting change as a trigger: process redesign, system migration, re-org affecting ownership, new risk acceptance decisions, audit findings, and incident learnings that change procedures or escalation.
We have too many channels (email, intranet, Slack, tickets). Is that a problem?
Too many channels creates conflicts and stale guidance. Define a source of truth for procedures and a small set of “official” broadcast channels, then direct all messages back to the authoritative procedure with version control.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream